[nycphp-talk] Pathetic Hacker Parade, vol 260
Daniel Convissor
danielc at analysisandsolutions.com
Sun Aug 8 23:10:34 EDT 2004
Hi Boys and Girls (there HAS to be SOME girls on this list, RIGHT???):
Here are the vulnerabilities from last week's SecurityFocus
newsletter, number 260. The pathetic hackers who consider themselves
programmers have done it
again<?php echo str_repeat(' and again', 11) ?>.
EasyWeb FileManager Module Directory Traversal Vulnerability
http://www.securityfocus.com/bid/10792
PostNuke Install Script Administrator Password Disclosure Vu...
http://www.securityfocus.com/bid/10793
EasyIns Stadtportal Site Parameter Remote File Include Vulne...
http://www.securityfocus.com/bid/10795
PostNuke Reviews Module Cross-Site Scripting Vulnerability
http://www.securityfocus.com/bid/10802
Invision Power Board Index.php Query String Cross-Site Scrip...
http://www.securityfocus.com/bid/10804
OpenDocMan Access Control Bypass Vulnerability
http://www.securityfocus.com/bid/10807
phpMyFAQ Image Manager Authentication Bypass Vulnerability
http://www.securityfocus.com/bid/10813
AntiBoard Multiple Input Validation Vulnerabilities
http://www.securityfocus.com/bid/10821
Phorum Search Script Cross-Site Scripting Vulnerability
http://www.securityfocus.com/bid/10822
Verylost LostBook Message Entry HTML Injection Vulnerability
http://www.securityfocus.com/bid/10825
JAWS ControlPanel.PHP SQL Injection Vulnerability
http://www.securityfocus.com/bid/10826
PowerPortal Private Message HTML Injection Vulnerability
http://www.securityfocus.com/bid/10835
FusionPHP Fusion News Administrator Command Execution Vulner...
http://www.securityfocus.com/bid/10836
--
T H E A N A L Y S I S A N D S O L U T I O N S C O M P A N Y
data intensive web and database programming
http://www.AnalysisAndSolutions.com/
4015 7th Ave #4, Brooklyn NY 11232 v: 718-854-0335 f: 718-854-0409
More information about the talk
mailing list